ABUSING BROWSER ADDRESS BAR FOR FUN AND PROFIT - AN EMPIRICAL INVESTIGATION OF ADD-ON CROSS SITE SCRIPTING ATTACKS Presenter: Jialong Zhang.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

WEB DESIGN TABLES, PAGE LAYOUT AND FORMS. Page Layout Page Layout is an important part of web design Why do you think your page layout is important?
Thank you to IT Training at Indiana University Computer Malware.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
©2009 Justin C. Klein Keane PHP Code Auditing Session 5 XSS & XSRF Justin C. Klein Keane
Cross Site Scripting a.k.a. XSS Szymon Siewior. Disclaimer Everything that will be shown, was created for strictly educational purposes. You may reuse.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
PHISHING By, Himanshu Mishra Parrag Mehta. OUTLINE What is Phishing ? Phishing Techniques Message Delivery Effects of Phishing Anti-Phishing Techniques.
Design and Evaluation of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song University of California,
Web-Based Attacks: Offense Wild Wild West Bob, Jeff, and Junia.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
How naïve are people on Internet Final, June 1st.
Browser Exploitation Framework (BeEF) Lab
Introduction to the OWASP Top 10. Cross Site Scripting (XSS)  Comes in several flavors:  Stored  Reflective  DOM-Based.
CROSS SITE SCRIPTING..! (XSS). Overview What is XSS? Types of XSS Real world Example Impact of XSS How to protect against XSS?
WEB SECURITY WORKSHOP TEXSAW 2013 Presented by Joshua Hammond Prepared by Scott Hand.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Prevent Cross-Site Scripting (XSS) attack
Dynamic Web Pages (Flash, JavaScript)
APT29 HAMMERTOSS Jayakrishnan M.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Filtering Out Exploits By Learning Trusted Functionality Martin Rinard Department of Electrical Engineering and Computer Science Computer Science.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Social Media 101 An Overview of Social Media Basics.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
VENKAT DEEP RAJAN SUMALATHA REDDY KARTHIK INJARAPU CPSC 620 CLEMSON UNIVERSITY.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
Cross Site Scripting and its Issues By Odion Oisamoje.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Presented by Teererai Marange. Background Open SSL Hearbeat extension Heartbleed vulnerability Description of work Methodology Summary of results Vulnerable.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Web Design and Development. World Wide Web  World Wide Web (WWW or W3), collection of globally distributed text and multimedia documents and files 
Presented to: Space 150 Dan Murphy Triton Digital.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
CSRF Attacks Daniel Chen 11/18/15. What is CSRF?  Cross Site Request Forgery (Sea-Surf)  AKA XSRF/ One Click / Sidejacking / Session Riding  Exploits.
Session Management Tyler Moore CS7403 University of Tulsa Slides adapted in part or whole from Dan Boneh, Stanford CS155 1.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Learning to Detect and Classify Malicious Executables in the Wild by J
Google’s Gruyere1 : An XSS Example Presented by: Terry Gregory
Group 18: Chris Hood Brett Poche
An Introduction to Web Application Security
Social Media Attacks.
Online Social Network: Threats &
Pinterest Clone Features
ISYM 540 Current Topics in Information System Management
Cross-Site Request Forgeries: Exploitation and Prevention
Dynamic Web Pages (Flash, JavaScript)
Dynamic Web Pages Jin Wu INF 385E Information Architecture
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems
Exploring DOM-Based Cross Site Attacks
Cross-Site Scripting Attack (XSS)
Cross Site Request Forgery (CSRF)
Presentation transcript:

ABUSING BROWSER ADDRESS BAR FOR FUN AND PROFIT - AN EMPIRICAL INVESTIGATION OF ADD-ON CROSS SITE SCRIPTING ATTACKS Presenter: Jialong Zhang

Roadmap  Introduction  Background and Motivation  Experiments  Discussion  Related Work  Conclusion

Introduction  Add-on Cross Site Scripting (XSS) Attacks  A sentence using social engineering techniques  Javascript:codes  For Example, on April 25, 2013, over 70,000 people have been affected by one such Add-on XSS attack on tieba.baidu.com.

Roadmap  Introduction  Background and Motivation  Experiments  Discussion  Related Work  Conclusion

Background

A Motivating Example

Roadmap  Introduction  Background and Motivation  Experiments  Discussion  Related Work  Conclusion

Expriments  Experiment One: Measuring Real-world Attacks  Experiment Two: User Study Using Amazon Mechanical Turks  Experiment Three: A Fake Facebook Account Test

Experiment One  Data Set:  Facebook: 187 million wall posts generated by roughly 3.5 million users  Twitter: 485,721 Twitter accounts with 14,401,157 tweets  Results  Facebook  Twitter CategoryDescription# of distinct samples Malicious BehaviorRedirecting to malicious sites Redirecting to malicious videos 40 3 Mischievous Tricks Sending invitations to friends Keep popping up windows Alert some words Benign BehaviorZooming images Letting images fly Discussion among technicians Total58 CategoryDescription# of distinct samples Malicious BehaviorRedirecting to malicious sites Including malicious JavaScript 2525 Benign BehaviorChanging Background Color Altering Textbox Color 1111 Total9

Experiment One – Discussion  Beyond Attacks in the Wild:  More Severe Damages Stealing confidential information Session fixation attacks Browser Address Bar Worms  More Technique to Increase Compromising Rate Trojan – Combining with Normal Functionality Obfuscating JavaScript Code  So we have experiment two.

Roadmap  Introduction  Background and Motivation  Experiments  Experiment One  Experiment Two  Experiment Three  Discussion  Related Work  Conclusion

Experiment Two  Methodology  Survey format Consent form Demographic survey Survey questions  Comparative survey changing one parameter but fixing others  Question sequence randomization  Platform: Amazon Mechanical Turk

Experiment Two  Results  Percentage of Deceived People According to Different Factors  Percentage of Deceived People According to Age  Percentage of Deceived People According to Different Spamming Categories  Percentage of Deceived People According to Programming Experiences  Percentage of Deceived People According to Years of Using Computers FactorWithout the factorWith the factor Obfuscated URL29.4%38.4% Lengthy JavaScript38.4%40.4% Combining with Benign Behavior 37.1%40.0% Typing “JavaScript:” and then Pasting Contents 38.2%20.3%

Experiment Two  Results  Percentage of Deceived People According to Age  Percentage of Deceived People According to Different Spamming Categories  Percentage of Deceived People According to Programming Experiences  Percentage of Deceived People According to Years of Using Computers AgeRate Age <= % 25 < Age <= % 30 < Age <= % Age > %

Experiment Two  Results  Percentage of Deceived People According to Different Spamming Categories  Percentage of Deceived People According to Programming Experiences  Percentage of Deceived People According to Years of Using Computers CategoryRate Magic (like flying images)38.4% Porn (like sexy girl)36.3% Family issue (like a wedding photo) 52.7% Free ticket29.2%

Experiment Two  Results  Percentage of Deceived People According to Programming Experiences  Percentage of Deceived People According to Years of Using Computers Programming ExperienceRate No38.4% Yes, but only a few times36.3% Yes52.7%

Experiment Two  Results  Percentage of Deceived People According to Years of Using Computers Years of Using ComputersRate < 5 years56.7% 5 – 10 years41.1% 10 – 15 years28.0% 15 – 20 years24.3%

Roadmap  Introduction  Background and Motivation  Experiments  Experiment One  Experiment Two  Experiment Three  Discussion  Related Work  Conclusion

Experiment Three  Experiment setup  A fake female account on Facebook using a university address.  By sending random invitations, the account gains 123 valid friends.  Experiment Execution  We post an add-on XSS sample. Description: a wedding photo JavaScript: show a wedding photo and send an request to a university web server  Result 4.9% deception rate.

Experiment Three  Comparing with experiment two – why is the rate much lower than the one in experiment two?  Not everyone has seen the status message.  The account is fake and thus no one knows this person.

Roadmap  Introduction  Background and Motivation  Experiments  Discussion  Related Work  Conclusion

Discussion  The motives of the participants  We state in the beginning that we will pay those participants no matter what their answers are.  Can we just disable address bar JavaScript?  There are some benign usages.  Ethics issue  No participant is actually being attacked.  We inform the participants after our survey.

Roadmap  Introduction  Background and Motivation  Experiments  Discussion  Related Work  Conclusion

Related Work  Human Censorship  Slow  Disabling Address Bar JavaScript  Dis-function of existing programs  Removing the keyword – “JavaScript”  Problem still exists (a user can input himself)  Defense on OSN Spam  High False Negative Rate

Roadmap  Introduction  Background and Motivation  Experiments  Discussion  Related Work  Conclusion

Conclusion  Add-on XSS combines social engineering and cross- site scripting.  We perform three experiments:  Real-world Experiment  Experiment using Amazon Mechanical Turks  Fake Facebook Account Experiment  Researchers and browser vendors should take actions to fight against add-on XSS attacks.

Thanks! Questions?